CVE-2025-2907
CRITICAL EXPLOITED NUCLEIOrder Delivery Date Pro for WooCommerce < 12.3.1 - Arbitrary Option Update
Title source: nucleiDescription
The Order Delivery Date WordPress plugin before 12.3.1 does not have authorization and CSRF checks when importing settings. Furthermore it also lacks proper checks to only update options relevant to the Order Delivery Date WordPress plugin before 12.3.1. This leads to attackers being able to modify the default_user_role to administrator and users_can_register, allowing them to register as an administrator of the site for complete site takeover.
Exploits (1)
Nuclei Templates (1)
Order Delivery Date Pro for WooCommerce < 12.3.1 - Arbitrary Option Update
CRITICALVERIFIEDby iamnoooob,rootxharsh,pdresearch
FOFA:
body="wp-content/plugins/order-delivery-date-for-woocommerce"
References (1)
Core 1
Core References
Exploit, Third Party Advisory exploit
vdb-entry
technical-description
https://wpscan.com/vulnerability/2e513930-ec01-4dc6-8991-645c5267e14c/
Scores
CVSS v3
9.8
EPSS
0.0978
EPSS Percentile
93.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
VulnCheck KEV
2025-04-04
CWE
CWE-352
Status
published
Products (1)
tychesoftwares/order_delivery_date_pro_for_woocommerce
< 12.3.1
Published
Apr 26, 2025
Tracked Since
Feb 18, 2026